Analysis

  • max time kernel
    84s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    17-04-2021 00:26

General

  • Target

    D0F8261B811B4FEED688F1F41DF9F3D3.exe

  • Size

    112KB

  • MD5

    d0f8261b811b4feed688f1f41df9f3d3

  • SHA1

    6ac3383dc13889ee1a00747104271aa482e1bcbc

  • SHA256

    f270e5838a9e760d920b64553ba77597a1550aacb2cbb557e0fff8d6a18fb714

  • SHA512

    82b7f42338d1f60fe246759f35e406b1e936cb6e64339e6314ce554621076794c21789a105f76d0edec2e78ed8292b4a7591bf737a3cf28a10b496e6d7536b26

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D0F8261B811B4FEED688F1F41DF9F3D3.exe
    "C:\Users\Admin\AppData\Local\Temp\D0F8261B811B4FEED688F1F41DF9F3D3.exe"
    1⤵
    • Modifies system certificate store
    PID:512

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads